БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 110

Dec 12, 2020

Cybersecurity experts warn millions of smart devices are vulnerable to hacking

Posted by in category: cybercrime/malcode

New research shows millions of devices are vulnerable to vulnerable, but there are ways to protect yourself.

Dec 10, 2020

Eclipse/Repairnator

Posted by in categories: cybercrime/malcode, robotics/AI

Automatic bug fixer.


Software development bot that automatically repairs build failures on continuous integration. Join the bot revolution! :star2::robot::star2::revolving_hearts: — eclipse/repairnator.

Dec 10, 2020

18+ Best Bug Tracking Software: Top Defect/Issue Tracking Tools of 2020

Posted by in category: cybercrime/malcode

Best bug tracking software tools and systems: track defects efficiently with these top tools.

We are testers – in other words, bug finders. Defect/Bug/Issue/Fault/Failure/Incident – whatever we choose to call – our primary job description revolves around finding, recording, reporting, managing and tracking these. There is no harm in using an excel sheet to record/track and emails to report/alert/communicate.

Dec 10, 2020

Automatic bug repair

Posted by in category: cybercrime/malcode

Circa 2015


At the Association for Computing Machinery’s Programming Language Design and Implementation conference this month, MIT researchers presented a new system that repairs dangerous software bugs by automatically importing functionality from other, more secure applications.

Remarkably, the system, dubbed CodePhage, doesn’t require access to the source code of the applications whose functionality it’s borrowing. Instead, it analyzes the applications’ execution and characterizes the types of security checks they perform. As a consequence, it can import checks from applications written in programming languages other than the one in which the program it’s repairing was written.

Continue reading “Automatic bug repair” »

Dec 9, 2020

Cybersecurity giant FireEye says it was hacked by govt-backed spies who stole its crown-jewels hacking tools

Posted by in category: cybercrime/malcode

Not a great look.

Dec 8, 2020

Hackers Breached Israeli Water Reservoir HMI System

Posted by in categories: cybercrime/malcode, cyborgs, internet

Hackers with possible links to Iran appear to have breached an unprotected human-machine interface system at an Israeli water reservoir that connected directly to the internet and lacked security protocols, according to industrial cybersecurity firm Otorio.

See Also: Live Webinar | Securing Mobile Endpoints to Protect IP in the Pharma Industry

The security firm reports that the alleged Iranian hacking group, referred to as “Unidentified TEAM,” published a video of the attack on an unnamed reclaimed Israeli water reservoir human-machine interface (HMI) system, which did not require any authentication to access and modify the system. This allowed the threat actors to tamper with the water pressure, change temperatures and more.

Dec 8, 2020

Norway says Russian groups ‘likely’ behind Parliament cyber attack

Posted by in category: cybercrime/malcode

Norway’s domestic security agency has said that Russian hackers linked to the country’s military intelligence service were “likely” behind a cyber attack against the Norwegian parliament this year.

The network operation behind the attack was part of “a broader national and international campaign that lasts at least since 2019” the Norwegian Police Security Service (PST) said in a statement.

Dec 8, 2020

Spies with Russia’s foreign intelligence service believed to have hacked a top American cybersecurity firm and stolen its sensitive tools

Posted by in category: cybercrime/malcode

The Russians stole hacking tools that FireEye uses to detect weaknesses in its customers’ networks, according to a person familiar with the matter.

Dec 8, 2020

FireEye, a Top Cybersecurity Firm, Says It Was Hacked by a Nation-State

Posted by in category: cybercrime/malcode

The Silicon Valley company said hackers — almost certainly Russian — made off with tools that could be used to mount new attacks around the world.

Dec 8, 2020

Cybersecurity firm FireEye says it was hacked by a nation-state

Posted by in categories: cybercrime/malcode, government

FireEye, normally the first company that cyberattack victims will call, has now admitted it too has fallen victim to hackers, which the company called a “sophisticated threat actor” that was likely backed by a nation-state.

In a blog post confirming the breach, the company’s chief executive Kevin Mandia said the nation-backed hackers have “top-tier offensive capabilities,” but did not attribute blame or say which government was behind the attack.

Mandia, who founded Mandiant, the incident response firm acquired by FireEye in 2014, said the hackers used a “novel combination of techniques not witnessed by us or our partners in the past” to steal hacking tools used typically by red teams, which are tasked with launching authorized but offensive hacking campaigns against customers in order to find weaknesses or vulnerabilities before malicious hackers do.